Boss Lady

The plain english guide to all that IT jargon you need to know

on


Although IT is a key component in business, there still seems to be a plethora of technical terms and jargon. Some of it even seems as though it’s intentionally there to confuse people.

Let’s break down some of that common jargon to help for better understanding.

A/B testing or split testing

Conducting research using multiple methods to identify how data is yielded differently. The primary example is email newsletters being sent out to split groups with different subject lines and analysing which has higher open rates.

Bandwidth

A measure of how fast data travels in a network system and connection.

Big Data

Large sets of data that are analysed to determine trends and patterns amongst an exceptionally big pool of figures.

Broadband

A wired connection of computers to the internet.

BYOD

“Bring Your Own Device”; refers to staff and employees using their own devices for work purposes

Cloud

Virtual servers with no physical destination, accessible through just an internet connection.

Cloud provider

A company or individual that supplies cloud-based technology.

Cloud storage

A place in the cloud to keep electronic files and documents without the need for physical space

Collaboration

The ability to communicate and work with a team either in person, through a device or internet connection.

Content management system (CMS)

An application for implementing content to a website, managing workflow and defining, creating and editing webpages.

CSS

Cascading Style Sheets; a set of rules that dictates how HTML should physically appear on the web.

Data cabling

Wires and cables that enable data to be transmitted from infrastructure to device.

Data capture

Software and hardware that extracts information and collates it accordingly.

Data mining

Analysing pre-existing data and developing new databases off the back of it.

Datafication

The process of converting everyday aspects into usable, electronic data.

DevOps

Development operations; identifying how to improve processes and communications by flagging and enhancing IT within systems.

Document management

A system for storing, creating, sharing and editing documents; can be self-hosted or cloud-based.

Firewall

A restrictor of passing data flowing through a connection that stops any traffic deemed unsavoury with the intention of preventing malware and viruses.

Html

Hyper Text Markup Language; coding tags used to define format and layout of content on the web.

Impressions

A metric for gauging how many times a website has been visible to a user; usually through search engine queries but also applicable to advertising and display campaigns.

In the wild

A virus that is present on computers or the internet that affects devices without downloading.

Internet of things (IoT)

The internet’s continued growth and presence in everyday objects other than typical computers and smartphones.

Migration

The transfer of an entire system from one location to another; usually transferring all data from one computer to another or from one server to another.

Netiquette

The perceived acceptable way of using the internet without malicious intent.

Open source

Readily available code accessible to anybody to use, modify or implement.

Operating system

The most basic software that a device runs on; supporting basic functions.

Organic

Views and visits that are the result of natural searches and not paid mediums.

Real-time

The act of data and metrics being updated as and when changes occur without a delay at all.

Responsive

The ability of a web page and the elements contained within it to adapt and fit to a specific screen size, making user experience by device more satisfactory.

Scalability

A measure of how much a system can grow and deal with an increased workload without the need to be built on or enhanced.

Server

A device or program that controls access to resources and the internet within a network of machines.

Network

A number of devices connected together with the intention of sharing; commonly used to share an internet connection rather than files and documents.

Spam

Unsolicited email that isn’t part of a subscribed mailing list; may also refer to cold calls and web content that serves no purpose or value.

Secure sockets layer (SSL)

Encryption technology that ensures the transmission of private data cannot be intercepted or tampered with resulting in a safe and secure network.

Sync

Relaying or copying data from one location to another; done for the purpose of backups or restoring devices.

Unified communications (UC)

Integration of (usually business) communication tools to enhance collaboration and improve work processes.

Version control

The management of renewed and revised software into chronological versions; gives clear indication of latest updates.

Virtual landline

Diverting landline calls to a mobile phone giving the appearance of fixed line.

Virtual private network (VPN)

Offers the ability to join a secure network whilst out of the office without increased security fears of public networks.

Voice over internet protocol (VoIP)

Hardware and software that allows phone calls to be placed and received over an internet connection rather than traditional phone lines.

Web browser

A software application for accessing the internet and webpages such as Google Chrome, Mozilla Firefox and Internet Explorer/Microsoft Edge.

About Lauren McDonough

Lauren McDonough works for iData (http://www.idata.uk.com/ ), providers of IT, communication and technology solutions for businesses of all sizes.

Recommended for you